TWI692703B - Method and system for presence identification and related computer-readable medium - Google Patents

Method and system for presence identification and related computer-readable medium Download PDF

Info

Publication number
TWI692703B
TWI692703B TW106137394A TW106137394A TWI692703B TW I692703 B TWI692703 B TW I692703B TW 106137394 A TW106137394 A TW 106137394A TW 106137394 A TW106137394 A TW 106137394A TW I692703 B TWI692703 B TW I692703B
Authority
TW
Taiwan
Prior art keywords
mobile device
user
time password
public key
password seed
Prior art date
Application number
TW106137394A
Other languages
Chinese (zh)
Other versions
TW201820196A (en
Inventor
羅蘭度 R. 費瑞拉
安德瑞溝 N. 品席洛
法比歐 拉斐爾
卡瑞尼 馬雅
喬斯 P. 皮爾斯
克里斯多夫 C. 莫爾曼
瓦利 阿里
Original Assignee
美商惠普發展公司有限責任合夥企業
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 美商惠普發展公司有限責任合夥企業 filed Critical 美商惠普發展公司有限責任合夥企業
Publication of TW201820196A publication Critical patent/TW201820196A/en
Application granted granted Critical
Publication of TWI692703B publication Critical patent/TWI692703B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords

Abstract

Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.

Description

用於出現識別之方法與系統及相關電腦可讀媒體 Method and system for occurrence identification and related computer readable media 發明領域 Field of invention

本發明大致係有關出現識別技術。 The present invention is generally about appearance recognition technology.

發明背景 Background of the invention

人們在每天的生活及工作中使用各種行動裝置(例如:手機、平板、筆電)。商業上,有時需要使用行動裝置來識別及/或認證個別使用者。舉例來說有時候可在一多因素認證方案中藉由使用作為一因素的一行動裝置來達到這種需求。舉例來說可藉由在行動裝置上顯示一密碼、自行動裝置廣播一信標等等來達到此方案。 People use various mobile devices (such as mobile phones, tablets, laptops) in their daily lives and work. Commercially, it is sometimes necessary to use mobile devices to identify and/or authenticate individual users. For example, sometimes this requirement can be met by using a mobile device as a factor in a multi-factor authentication scheme. For example, this scheme can be achieved by displaying a password on the mobile device, broadcasting a beacon from the mobile device, and so on.

發明概要 Summary of the invention

依據本發明之一可行實施例,係特地提出一種方法,其包含偵測藉由屬於一使用者的行動裝置廣播的一出現識別符,其中該出現識別符的一部份係基於一一次性密碼種子而產生;提供該出現識別符的該部分至一識別伺服器;自該識別伺服器接收與該使用者相關聯的識別資訊,其中 該識別伺服器使用該部分以基於該一次性密碼種子識別該使用者;及基於該識別資訊執行一動作。 According to a feasible embodiment of the present invention, a method is specifically proposed which includes detecting an occurrence identifier broadcast by a mobile device belonging to a user, wherein a part of the occurrence identifier is based on a one-time The password seed is generated; providing the portion of the occurrence of the identifier to an identification server; receiving identification information associated with the user from the identification server, wherein The identification server uses the part to identify the user based on the one-time password seed; and performs an action based on the identification information.

較佳實施例之詳細說明 Detailed description of the preferred embodiment

關聯於出現識別的系統、方法及同等設備被描述。如上所述,由裝置所廣播的信標可被用來對部分的商業資訊科技基礎設施識別及/或認證使用者。儘管如此,當一使用者之行動裝置經常廣播一訊號信標或包括與該使用者相關的個人資訊時,即可能存在隱私及/或安全的顧慮。舉例說明,經常廣播一信標的使用者可能會在他移動、拜訪客戶等等的時候被追蹤。進一步的,廣播一識別信標可能易於至一經處理資源來存取此資源。The systems, methods and equivalent devices associated with the occurrence identification are described. As mentioned above, the beacons broadcast by the device can be used to identify and/or authenticate users to some of the business information technology infrastructure. Nevertheless, when a user's mobile device often broadcasts a signal beacon or includes personal information related to the user, there may be privacy and/or security concerns. For example, a user who frequently broadcasts a beacon may be tracked as he moves, visits customers, etc. Further, broadcasting an identification beacon may facilitate access to a processed resource to access this resource.

為了處理隱私及安全的挑戰,一使用者的行動裝置可被嵌入一一次性密碼種子,其複本被儲存於在管理資訊科技資源方面協助一公司的一識別伺服器中。因此,一行動裝置可基於此一次性密碼種子及此行動裝置已知的一時間表轉換其出現識別符,而不是廣播一單一出現識別符。當此出現識別符被一經管理裝置偵測到的時候,此經管理裝置可跟識別伺服器確認此出現識別符係真實的。此識別伺服器可使用其一次性密碼種子的複本來認證此使用者,及准許經管理裝置根據此經管理裝置的功能連結到行動裝置及/或與使用者互動。In order to deal with privacy and security challenges, a user's mobile device can be embedded with a one-time password seed, a copy of which is stored in an identification server that assists a company in managing IT resources. Therefore, instead of broadcasting a single occurrence identifier, a mobile device can convert its occurrence identifier based on the one-time password seed and a schedule known by the mobile device. When the presence identifier is detected by the management device, the management device can confirm with the recognition server that the presence identifier is true. The identification server can use the copy of its one-time password seed to authenticate the user, and permit the managed device to connect to the mobile device and/or interact with the user based on the function of the managed device.

圖1描繪關聯於出現識別之範例裝置。應了解的是描繪於圖1中的項目為例示性範例,且諸多不同的系統、裝置等等,可依據各種範例操作。Figure 1 depicts an example device associated with occurrence recognition. It should be understood that the items depicted in FIG. 1 are illustrative examples, and that many different systems, devices, etc. can operate according to various examples.

圖1描繪一行動裝置100。舉例來說行動裝置可為:一手機、一平板、一膝上型電腦等等。行動裝置100可藉由一使用者控制。此使用者可企圖在一公司的資料科技基礎設施中將自己關聯於行動裝置100,使得使用者可利用由基礎設施管理的資源及裝置。舉例來說,這在當使用者係公司的一員工、付錢以使用由公司提供的服務…等等時是適當的。因此,使用者可將行動裝置100登記到一識別伺服器120。在一些範例中,此登記可能係透過一註冊裝置130來處理。舉例來說註冊裝置可為使用者個個人電腦、當使用者係公司的員工時由公司提供的一電腦等等。在其他情況下行動裝置100直接與識別伺服器120導引登記係適當的。其在行動裝置100有辦法建立一安全連結至識別伺服器120時係適當的。FIG. 1 depicts a mobile device 100. For example, the mobile device may be: a mobile phone, a tablet, a laptop, etc. The mobile device 100 can be controlled by a user. The user may attempt to associate himself with the mobile device 100 in a company's data technology infrastructure so that the user can utilize resources and devices managed by the infrastructure. For example, this is appropriate when the user is an employee of the company, pays to use the services provided by the company, etc. Therefore, the user can register the mobile device 100 to an identification server 120. In some examples, this registration may be processed through a registration device 130. For example, the registration device may be a personal computer of the user, a computer provided by the company when the user is an employee of the company, and so on. In other cases, it is appropriate for the mobile device 100 to directly register with the recognition server 120. It is appropriate when the mobile device 100 has a way to establish a secure connection to the identification server 120.

登記的程序可使得識別伺服器120儲存關聯於使用者及行動裝置100的識別資訊。識別資訊亦可包括作為部分登記程序而提供至行動裝置100一一次性密碼種子125。此外,識別資訊一可包括一第一公共金鑰。此第一公共金鑰可藉由行動裝置100產生,並與行動裝置秘密儲存的一第一私人金鑰配對。如同將在下方描述的,第一公共金鑰及第一私人金鑰可由行動裝置100使用來與藉由資訊科技基礎設施(例如:經管理裝置110)管理的裝置安全地通訊及/或建立安全連結。The registration process enables the identification server 120 to store identification information related to the user and the mobile device 100. The identification information may also include a one-time password seed 125 provided to the mobile device 100 as part of the registration process. In addition, the identification information 1 may include a first public key. This first public key can be generated by the mobile device 100 and paired with a first private key secretly stored in the mobile device. As will be described below, the first public key and the first private key can be used by the mobile device 100 to securely communicate with and/or establish security with devices managed by the information technology infrastructure (eg, via the management device 110) link.

一旦行動裝置100接收了一次性密碼種子125,行動裝置100可開始週期性地廣播一出現識別符105。出現識別符105可藉由行動裝置100基於一次性密碼種子125而產生。特別是,基於行動裝置100及識別伺服器120已知的時間表,行動裝置100可廣播一系列的不同出現識別符105。舉例說明,在一第一時間期間內,行動裝置100可廣播基於關聯於第一時間期間的一時間戳記及基於一次性密碼種子125產生的一第一出現識別符。在一第一時間期間結束後的一第二時間期間開始時,行動裝置100可基於關聯於第二時間期間的一時間戳記及基於一次性密碼種子125廣播一第二出現識別符。行動裝置100廣播一個人出現識別符的時間的長度可取決於一公司操作識別伺服器120所要求的安全重要性、由行動裝置100的使用者要求的匿名性…等等。在一些範例中,各個由行動裝置100廣播的出現識別符105可針對其特定的廣播而被獨特的產生。Once the mobile device 100 receives the one-time password seed 125, the mobile device 100 may begin to periodically broadcast an occurrence identifier 105. The presence identifier 105 can be generated by the mobile device 100 based on the one-time password seed 125. In particular, based on a known schedule of the mobile device 100 and the recognition server 120, the mobile device 100 may broadcast a series of different occurrence identifiers 105. For example, within a first time period, the mobile device 100 may broadcast a first occurrence identifier generated based on a time stamp associated with the first time period and based on the one-time password seed 125. At the beginning of a second time period after the end of a first time period, the mobile device 100 may broadcast a second occurrence identifier based on a time stamp associated with the second time period and based on the one-time password seed 125. The length of time that the mobile device 100 broadcasts the identification of a person may depend on the security importance required by a company to operate the identification server 120, the anonymity requested by the user of the mobile device 100, etc. In some examples, each occurrence identifier 105 broadcast by the mobile device 100 may be uniquely generated for its specific broadcast.

出現識別符可由經管理裝置110偵測。經管理裝置110可為構成一公司的資訊科技基礎設施的一裝置、設備…等等。舉例來說,這些裝置可包括:印表機、電腦、安全檢查點、會議科技、以及可能會有需要對其識別及/或認證行動裝置100的使用者的其他類型之裝置。The presence identifier can be detected by the management device 110. The management device 110 may be a device, equipment, etc. that constitute a company's information technology infrastructure. For example, these devices may include: printers, computers, security checkpoints, conference technology, and other types of devices that may need to identify and/or authenticate users of the mobile device 100.

當經管理裝置110偵測到一出現識別符105時,經管理裝置可連絡識別伺服器120以判定此出現識別符105係否有效。因此,識別伺服器120可使用其一次性密碼種子125之複本來驗證出現識別符105及/或使用儲存在行動裝置100上的一次性密碼種子125之複本產生的出現識別符125之一部分。當識別伺服器120成功的驗證出現識別符105時,識別伺服器120可提供關聯於使用者及/或行動裝置100的識別資訊至經管理裝置110。此舉可允許經管理裝置110基於經管理裝置110的功能代表使用者及/或行動裝置100採取一些動作。When the management device 110 detects an occurrence identifier 105, the management device may contact the identification server 120 to determine whether the occurrence identifier 105 is valid. Therefore, the recognition server 120 may use the copy of its one-time password seed 125 to verify the presence identifier 105 and/or a portion of the appearance identifier 125 generated using the copy of the one-time password seed 125 stored on the mobile device 100. When the identification server 120 successfully verifies that the identifier 105 appears, the identification server 120 may provide identification information associated with the user and/or mobile device 100 to the managed device 110. This may allow the managed device 110 to take some actions on behalf of the user and/or the mobile device 100 based on the functions of the managed device 110.

由經管理裝置110採取的行動的類型可基於經管理裝置110被設計來執行的功能的類型。舉例說明,當使用者走進一會議室時,此會議室的一經管理裝置110可偵測出現識別符105並,在與識別伺服器130確認出現識別符105之後,針對使用者保留此會議室。舉例來說,在一些範例中經管理裝置110亦可開始特定的會議室特色操作(例如:一投影機、一視訊會議服務)、啟動關聯於使用者之行事曆之一會議、在會議室的一電腦上開啟關聯於使用者之帳號的一虛擬桌面…等等。用來起動這些不同特點的資訊可能係自識別伺服器130本身、或自經管理裝置110能存取的資訊科技基礎建設的一部份之其他裝置獲得。舉例來說,經管理裝置110的其他類型可包括:電腦、印表機、安全措施…等等。The type of action taken by the managed device 110 may be based on the type of function the managed device 110 is designed to perform. For example, when a user walks into a meeting room, the management device 110 of the meeting room can detect the presence of the identifier 105 and, after confirming with the recognition server 130 that the identifier 105 is present, reserve the meeting room for the user. For example, in some examples, the management device 110 can also start specific conference room feature operations (for example: a projector, a video conference service), start a conference associated with the user's calendar, Open a virtual desktop associated with the user's account on a computer...etc. The information used to activate these different features may be obtained from the identification server 130 itself, or from other devices that are part of the information technology infrastructure accessible by the management device 110. For example, other types of managed devices 110 may include: computers, printers, security measures, etc.

在其他的範例中,經管理裝置110與行動裝置100建立一安全連結係理想的。其在經管理裝置110係設計來使用儲存在行動裝置100上的資料執行一些服務時係理想的。舉例來說,一安全連結可基於藉由識別伺服器120促進的在行動裝置100及經管理裝置110間的安全金鑰之交換而建立。在一範例中,經管理裝置110可使用如上所述藉由識別伺服器120儲存保留在識別資訊中的第一公共金鑰。因此,當識別伺服器120驗證出現識別符105時,識別伺服器120可傳輸第一公共金鑰至經管理裝置110。另外,經管理裝置110可傳輸一第二公共金鑰至行動裝置100。此第二公共金鑰可與藉由經管理裝置110保有在一安全儲存器中的一第二私人金鑰配對。行動裝置100可接著與識別伺服器120驗證此第二公共金鑰以確保經管理裝置110係包括在關聯於識別伺服器120的資訊科技基礎建設中的一裝置。此驗證與藉由經管理裝置110接收的第一公共金鑰一起可完成一成功的安全金鑰之交換,其可用於確保行動裝置100及經管理裝置110間的通訊。In other examples, it is desirable to establish a secure connection between the management device 110 and the mobile device 100. It is ideal when the management device 110 is designed to perform some services using data stored on the mobile device 100. For example, a secure connection may be established based on the exchange of security keys between the mobile device 100 and the managed device 110 facilitated by the identification server 120. In one example, the managed device 110 may use the first public key stored in the identification information by the identification server 120 as described above. Therefore, when the identification server 120 verifies that the identifier 105 is present, the identification server 120 may transmit the first public key to the managed device 110. In addition, the management device 110 can transmit a second public key to the mobile device 100. This second public key can be paired with a second private key held in a secure storage by the management device 110. The mobile device 100 can then verify this second public key with the identification server 120 to ensure that the managed device 110 is a device included in the information technology infrastructure associated with the identification server 120. This verification, together with the first public key received via the management device 110, can complete a successful exchange of security keys, which can be used to ensure communication between the mobile device 100 and the managed device 110.

應理解的是,在下列描述中多個特定的細節被述說來提供此等範例的透徹了解。然而,應被理解的是這些範例可以在不限於此等特定細節的情況下被實現。在其他的狀況中,可能有對方法及結構的詳細描述以避免對此等範例之描述不必要的隱藏。此等範例亦可被彼此相互結合來使用。It should be understood that a number of specific details are described in the following description to provide a thorough understanding of these examples. However, it should be understood that these examples can be implemented without being limited to such specific details. In other situations, there may be a detailed description of the method and structure to avoid unnecessary hiding of the description of these examples. These examples can also be used in combination with each other.

本文所使用的「模組」包括但不限於硬體、韌體、儲存在一電腦可讀媒體上或在一機器上被執行的軟體、及/或其相互結合以執行一(或多)個功能或一(或多)個動作、及/或使另一個模組、方法及/或系統產生功能或動作。一模組可包括一經軟體控制的微處理器、一離散模組、一類比電路、一數位電路、一經程式化模組裝置、一含有指令之記憶體裝置…等等。模組可包括閘、閘的組合、或其他電路元件。複數個邏輯模組被描述時,此等複數個邏輯模組可能被包含進一實體模組中。類似地,一單一邏輯模組被描述時,此單一模組可能被分配至複數個實體模組之間。As used herein, "module" includes, but is not limited to, hardware, firmware, software stored on a computer-readable medium or executed on a machine, and/or combined with each other to execute one (or more) A function or one (or more) actions, and/or causes another module, method, and/or system to generate a function or action. A module may include a microprocessor controlled by software, a discrete module, an analog circuit, a digital circuit, a programmed module device, a memory device containing instructions, etc. The module may include a gate, a combination of gates, or other circuit elements. When a plurality of logic modules are described, these plurality of logic modules may be included in a physical module. Similarly, when a single logical module is described, the single module may be distributed among multiple physical modules.

圖2描繪一範例方法200。方法200可在儲存處理器可讀的指令之一非暫時性處理器可讀媒體上被實現。此等指令在由一處理器執行時可使得處理器執行方法200。在其他範例中,方法200可存在於一特定應用積體電路(ASIC)的邏輯閘及/或RAM中。FIG. 2 depicts an example method 200. Method 200 may be implemented on a non-transitory processor-readable medium storing one of processor-readable instructions. Such instructions, when executed by a processor, may cause the processor to perform the method 200. In other examples, the method 200 may exist in a logic gate and/or RAM of an application specific integrated circuit (ASIC).

方法200可執行關聯於個人識別的各種任務。在不同的範例中,方法200可藉由經管理為一公司的資訊科技基礎建設之一部分的一裝置來執行,其類似於經管理裝置110(圖1)。方法200包括在動作210偵測一出現識別符。可自一行動裝置接收廣播。舉例來說,涉及行動裝置的整個方法200可藉由一匹配技術,諸如藍芽、近距離通訊、WIFI…等等發生。舉例來說,行動裝置可為一手機、一膝上型電腦、一平板…等等。行動裝置可能屬於使用者。出現識別符的一部份可能基於一一次性密碼種子而產生。此部分亦可基於行動裝置已知的一時間表而產生,使得行動裝置週期性的改變被廣播的出現識別符。此可允許行動裝置混淆行動裝置的使用者的身分。The method 200 may perform various tasks related to personal identification. In different examples, the method 200 may be performed by a device that is managed as part of a company's IT infrastructure, which is similar to the managed device 110 (FIG. 1). The method 200 includes detecting an occurrence identifier at act 210. Can receive broadcasts from a mobile device. For example, the entire method 200 involving mobile devices may occur by a matching technique, such as Bluetooth, near field communication, WIFI, etc. For example, the mobile device may be a mobile phone, a laptop, a tablet, etc. The mobile device may belong to the user. The part where the identifier appears may be generated based on a one-time password seed. This part can also be generated based on a schedule known by the mobile device, so that the mobile device periodically changes the presence identifier broadcast. This may allow the mobile device to confuse the identity of the user of the mobile device.

方法200亦包括在動作220提供出現識別符的該部份至一識別伺服器。方法200亦可包括在動作230接收識別資訊。此識別資訊可關聯於該使用者。此識別資訊可接收自識別伺服器。識別伺服器可使用出現識別符的該部份來基於一次性密碼種子識別使用者。The method 200 also includes providing, at act 220, the portion where the identifier is present to an identification server. The method 200 may also include receiving identification information at act 230. This identification information can be associated with the user. This identification information can be received from the identification server. The identification server may use the portion where the identifier appears to identify the user based on the one-time password seed.

方法200亦包括在動作240執行一動作。此動作可基於識別資訊而被執行。在不同的範例中,此動作可包括允許使用者存取藉由執行方法200的一裝置管理的一資產、為使用者提供一資源、與行動裝置建立一安全連結…等等。The method 200 also includes performing an action at act 240. This action can be performed based on the identification information. In different examples, this action may include allowing the user to access an asset managed by a device performing method 200, providing a resource for the user, establishing a secure connection with the mobile device, etc.

藉由具體說明的方式,可藉由交換由識別伺服器認證的公共金鑰來建立一安全連結。舉例說明,一第一公共金鑰可被提供至行動裝置,此行動裝置可接著以識別伺服器驗證此第一公共金鑰。進一步的,關聯於行動裝置的一第二公共金鑰可包括由識別伺服器提供的識別資訊。因此,執行方法200的一裝置可能能夠使用此第二公共金鑰來與行動裝置安全地通訊,且此行動裝置可能能夠使用第一公共金鑰來與執行方法200的裝置安全地通訊。By way of specific description, a secure connection can be established by exchanging the public key authenticated by the identification server. For example, a first public key can be provided to the mobile device, and the mobile device can then verify the first public key with an identification server. Further, a second public key associated with the mobile device may include identification information provided by the identification server. Therefore, a device executing method 200 may be able to use the second public key to communicate securely with the mobile device, and the mobile device may be able to use the first public key to communicate securely with the device executing method 200.

圖3描繪一系統300。系統300包括一資料儲存器310。資料儲存器310可儲存關聯於具有行動裝置399的使用者之註冊資訊集合。註冊資訊集合可包括個別的一次性密碼種子。Figure 3 depicts a system 300. The system 300 includes a data storage 310. The data storage 310 may store a set of registration information associated with a user having a mobile device 399. The registration information set may include individual one-time password seeds.

系統300亦包括一註冊模組320。註冊模組320可自一使用者接收一註冊要求以將行動裝置399關聯餘此使用者。在一些範例中,註冊要求可透過一註冊裝置(未顯示)自行動裝置399接收。在此範例中,一次性密碼種子可透過註冊裝置提供至行動裝置399。The system 300 also includes a registration module 320. The registration module 320 can receive a registration request from a user to associate the mobile device 399 with this user. In some examples, the registration request may be received from the mobile device 399 through a registered device (not shown). In this example, the one-time password seed can be provided to the mobile device 399 through the registered device.

系統300亦包括一一次性密碼種子產生模組330。一次性密碼種子產生模組330可針對行動裝置399產生一一次性密碼種子。一次性密碼種子產生模組330亦可提供一次性密碼種子至行動裝置。一次性密碼種子產生模組330亦可在資料儲存器310中儲存關聯於使用者的註冊資料集合、行動裝置399、以及一次性密碼種子。The system 300 also includes a one-time password seed generation module 330. The one-time password seed generation module 330 can generate a one-time password seed for the mobile device 399. The one-time password seed generation module 330 can also provide the one-time password seed to the mobile device. The one-time password seed generation module 330 may also store the registered data set associated with the user, the mobile device 399, and the one-time password seed in the data storage 310.

系統300亦包括一驗證模組340。驗證模組340可自一經管理裝置390接收一要求。自經管理裝置390的要求可響應於藉由行動裝置399廣播的一出現識別符而被接收。此出現識別符可包括基於在行動裝置399中的一次性密碼種子產生的一一次性密碼。接收到要求後,驗證模組340可接著基於儲存於資料儲存器310中的一次性密碼種子來驗證一次性密碼,及提供關聯於使用者的識別資訊至經管理裝置390。在一些範例中,提供關聯於使用者的識別資訊至經管理裝置390可控制經管理裝置390來針對行動裝置399的使用者執行一動作。藉由具體說明的方式,識別資訊可授權使用者以使用藉由經管理裝置390控制的資源。The system 300 also includes a verification module 340. The verification module 340 can receive a request from the management device 390. The request from the management device 390 may be received in response to an appearance identifier broadcast by the mobile device 399. The presence identifier may include a one-time password generated based on the one-time password seed in the mobile device 399. After receiving the request, the verification module 340 may then verify the one-time password based on the one-time password seed stored in the data storage 310 and provide identification information associated with the user to the managed device 390. In some examples, providing the identification information associated with the user to the managed device 390 can control the managed device 390 to perform an action against the user of the mobile device 399. By way of specific description, the identification information may authorize the user to use the resources controlled by the management device 390.

在一範例中,由註冊模組320接收的註冊要求可包括由行動裝置399產生的一公共金鑰。此公共金鑰可與儲存於行動裝置399中的一私人金鑰配對。此公共金鑰可藉由一次性密碼種子產生模組330儲存在資料儲存器中做為關聯於使用者、行動裝置399、及一次性密碼種子的註冊資料集合的一部份。在此範例中,當識別資訊係由驗證模組340提供至經管理裝置390時,此識別資訊可包括公共金鑰。其可促進經管理裝置390及行動裝置399間安全通訊的建立。In an example, the registration request received by the registration module 320 may include a public key generated by the mobile device 399. The public key can be paired with a private key stored in the mobile device 399. This public key can be stored in the data storage by the one-time password seed generation module 330 as part of the registration data set associated with the user, the mobile device 399, and the one-time password seed. In this example, when the identification information is provided by the verification module 340 to the managed device 390, the identification information may include a public key. It can facilitate the establishment of secure communication between the managed device 390 and the mobile device 399.

圖4描繪一方法400。方法400可藉由像是行動裝置100(圖1)的裝置執行。此裝置可藉由一使用者控制。方法400包括在動作410傳輸註冊資料至一識別伺服器。註冊資料可包括一第一公共金鑰。第一註冊金鑰可與儲存在此裝置中的一第一私人金鑰配對。註冊資料可藉由識別伺服器使用來使一一次性密碼種子關聯於該裝置的一使用者。Figure 4 depicts a method 400. Method 400 may be performed by a device like mobile device 100 (FIG. 1). This device can be controlled by a user. Method 400 includes transmitting registration data to an identification server at act 410. The registration information may include a first public key. The first registration key can be paired with a first private key stored in the device. The registration data can be used by the identification server to associate a one-time password seed with a user of the device.

方法400亦包括在動作420接收一次性密碼種子。一次性密碼種子可自識別伺服器接收。在一些範例中,在動作410傳輸至識別伺服器的註冊資料可以係透過一註冊裝置傳輸。在此範例中,一次性密碼種子可透過註冊裝置自識別伺服器接收。The method 400 also includes receiving a one-time password seed in act 420. The one-time password seed can be received from the identification server. In some examples, the registration data transmitted to the identification server in act 410 may be transmitted through a registration device. In this example, the one-time password seed can be received from the identification server through the registered device.

方法400亦包括在動作430週期性地廣播一出現識別符。出現識別符可包括基於一次性密碼種子產生的一一次性密碼。因此,出現識別符可基於一次性密碼種子週期性地改變,其可能會混淆此裝置使用者的識別。出現識別符可由一經管理裝置使用以自識別伺服器獲得識別此裝置使用者的資訊。出現識別符及/或識別此裝置使用者的資訊可由經管理裝置使用以代表使用者執行一動作。The method 400 also includes periodically broadcasting an occurrence identifier at act 430. The presence identifier may include a one-time password generated based on the one-time password seed. Therefore, the presence identifier may be changed periodically based on the one-time password seed, which may confuse the user of this device. The presence identifier can be used by a management device to obtain information identifying the user of the device from the identification server. The presence of the identifier and/or information identifying the user of this device can be used by the managed device to perform an action on behalf of the user.

圖5描繪關聯於出現識別之一方法500。方法500包括數個類似於參考上述方法400(圖4)的動作。舉例說明,方法500包括在動作510傳輸註冊資料至一識別伺服器、在動作520接收一一次性密碼種子、及在動作530週期性地廣播一出現識別符。FIG. 5 depicts one method 500 associated with occurrence recognition. Method 500 includes several actions similar to those described above with reference to method 400 (FIG. 4). For example, the method 500 includes transmitting registration data to an identification server at act 510, receiving a one-time password seed at act 520, and periodically broadcasting an occurrence identifier at act 530.

方法500亦包括在動作540接收一第二公共金鑰。第二公共金鑰可接收自一經管理裝置,此經管理裝置接收在動作530廣播的出現識別符。The method 500 also includes receiving a second public key at act 540. The second public key may be received from a managed device, which receives the presence identifier broadcast at act 530.

方法500亦包括在動作550以識別伺服器驗證第二公共金鑰。驗證第二公共金鑰可對執行動作500的裝置確保第二公共金鑰係自一裝置接收,此裝置係關聯於識別伺服器550的資訊科技基礎建設的一部分。因此,驗證第二公共金鑰可防止執行方法500的裝置在無意中傳輸敏感的資料至一未經授權的裝置。The method 500 also includes at act 550 to identify the server to verify the second public key. Verifying the second public key can ensure that the device performing action 500 receives the second public key from a device that is part of the information technology infrastructure associated with the identification server 550. Therefore, verifying the second public key can prevent the device executing the method 500 from inadvertently transmitting sensitive data to an unauthorized device.

方法500亦包括在動作560與經管理裝置建立一安全連結。此安全連結可基於第二公共金鑰及基於經管理裝置自該識別伺服器接收第一公共金鑰而建立,此第一公共金鑰係在由識別伺服器提供至經管理裝置的識別資訊中。The method 500 also includes establishing a secure connection with the managed device at act 560. The secure link can be established based on the second public key and based on the managed device receiving the first public key from the identification server, the first public key is included in the identification information provided by the identification server to the managed device .

圖6描繪一範例運算裝置,在其中可操作一範例系統、及方法、以及同等設備。範例運算裝置可為一電腦600,其包括一處理器610及藉由一匯流排630連結的一記憶體620。電腦600包括一出現識別模組640。出現識別模組640可單獨或以結合的方式執行上列參考範例系統、方法等等描述的各種功能。在不同的範例中,出現識別模組640可實現為一非暫時性電腦可讀媒體,此非暫時性電腦可讀媒體在硬體、軟體、韌體、一特定應用積體電路、及/或其組合中存有可由處理器執行之指令。FIG. 6 depicts an example computing device in which an example system, method, and equivalent equipment can be operated. The example computing device may be a computer 600, which includes a processor 610 and a memory 620 connected by a bus 630. The computer 600 includes an appearance recognition module 640. The presence identification module 640 can perform various functions described above with reference to example systems, methods, etc. alone or in combination. In different examples, the presence identification module 640 may be implemented as a non-transitory computer-readable medium. The non-transitory computer-readable medium is in hardware, software, firmware, an application-specific integrated circuit, and/or The combination contains instructions executable by the processor.

此等指令亦可作為資料650及/或程序660而呈現至電腦600,資料650及/或程序660係暫時儲存於記憶體620中並稍後由處理器610執行。處理器610可為包括雙微處理器及其他多處理器架構的各種處理器。記憶體620可包括非依電性記憶體(例如:唯讀記憶體)及/或依電性記憶體(例如:隨機存取記憶體)。舉例說明,記憶體620亦可為一磁碟驅動器、一固態硬碟驅動器、一軟碟驅動器、一磁帶驅動器、一快閃記憶體卡片、一光碟…等等。因此,記憶體620可儲存程序660及/或資料650。電腦600亦可關聯於包括電腦、裝置、周邊設備…等等多種組態(未顯示)之其他裝置。These instructions can also be presented to the computer 600 as data 650 and/or programs 660, which are temporarily stored in the memory 620 and later executed by the processor 610. The processor 610 may be various processors including dual microprocessors and other multi-processor architectures. The memory 620 may include non-dependent memory (for example, read-only memory) and/or dependent memory (for example: random access memory). For example, the memory 620 may also be a magnetic disk drive, a solid-state hard disk drive, a floppy disk drive, a magnetic tape drive, a flash memory card, an optical disk, etc. Therefore, the memory 620 may store the program 660 and/or the data 650. The computer 600 can also be associated with other devices including computers, devices, peripheral devices, etc. in various configurations (not shown).

可以理解的,前述所揭露的範例係提供以使任何熟於此技者能夠做到或使用本發明。這些範例的各種變化對於熟於此技者而言將係顯而易見的,而本文所定義的通用原則亦可在不背離本發明之精神及範圍之情況下應用於其他範例中。因此,本發明並不意欲被限於本文所顯示之範例,而是符合與本文所揭露之原則及新穎特徵一致之最廣的範圍。Understandably, the foregoing disclosed examples are provided to enable anyone skilled in the art to make or use the present invention. Variations of these examples will be obvious to those skilled in the art, and the general principles defined herein can also be applied to other examples without departing from the spirit and scope of the present invention. Therefore, the present invention is not intended to be limited to the examples shown herein, but conforms to the widest scope consistent with the principles and novel features disclosed herein.

100、399‧‧‧行動裝置105‧‧‧出現識別符110、390‧‧‧經管理裝置120‧‧‧識別伺服器125‧‧‧一次性密碼種子130‧‧‧註冊裝置200、400、500‧‧‧方法210、220、230、240、410、420、430、510、520、530、540、550、560‧‧‧動作300‧‧‧系統310‧‧‧資料儲存器320‧‧‧註冊模組330‧‧‧一次性密碼種子產生模組340‧‧‧驗證模組600‧‧‧電腦610‧‧‧處理器620‧‧‧記憶體630‧‧‧匯流排640‧‧‧出現識別模組650‧‧‧資料660‧‧‧程序100, 399‧‧‧Mobile device 105‧‧‧Identifier 110, 390‧‧‧ Management device 120‧‧‧Identify server 125‧‧‧One-time password seed 130‧‧‧Registration device 200, 400, 500 ‧‧‧ Methods 210, 220, 230, 240, 410, 420, 430, 510, 520, 530, 540, 550, 560 ‧ ‧ ‧ action 300 ‧ ‧ ‧ system 310 ‧ ‧ ‧ data storage 320 ‧ ‧ ‧ registration Module 330‧‧‧One-time password seed generation module 340‧‧‧Verification module 600‧‧‧Computer 610‧‧‧Processor 620‧‧‧Memory 630‧‧‧Bus 640‧‧‧ Group 650‧‧‧ Data 660‧‧‧ Procedure

本發明可就所附圖式以及下方之詳細描述而更容易被完全了解。 The invention can be more fully understood with reference to the drawings and the detailed description below.

圖1描繪關聯於出現識別之範例裝置。 Figure 1 depicts an example device associated with occurrence recognition.

圖2描繪關聯於出現識別之操作範例的一流程圖。 FIG. 2 depicts a flowchart of an operation example associated with occurrence recognition.

圖3描繪關聯於出現識別一範例系統。 Figure 3 depicts an example system associated with occurrence recognition.

圖4描繪關聯於出現識別之操作範例的另一流程圖。 FIG. 4 depicts another flow chart associated with an example of operation of occurrence recognition.

圖5描繪關聯於出現識別之操作範例的另一流程圖。 FIG. 5 depicts another flowchart associated with an example of operation of occurrence recognition.

圖6描繪一範例運算裝置,在其中可操作一範例系統、及方法、以及同等設備。 FIG. 6 depicts an example computing device in which an example system, method, and equivalent equipment can be operated.

200:方法 200: Method

210、220、230、240:動作 210, 220, 230, 240: action

Claims (15)

一種用於出現識別之方法,其包含:偵測由屬於一使用者的行動裝置所廣播的一出現識別符,其中該出現識別符的一部份係基於一一次性密碼種子而產生;提供該出現識別符的該部分至一識別伺服器;自該識別伺服器接收關聯於該使用者的識別資訊,其中該識別伺服器使用該部分以基於該一次性密碼種子識別該使用者;及基於該識別資訊執行一動作。 A method for appearance recognition, comprising: detecting an appearance identifier broadcast by a mobile device belonging to a user, wherein a part of the appearance identifier is generated based on a one-time password seed; The portion of the identifier that appears to an identification server; receiving identification information associated with the user from the identification server, wherein the identification server uses the portion to identify the user based on the one-time password seed; and based on The identification information performs an action. 如請求項1之方法,其中該動作係與該行動裝置建立一安全連結。 The method of claim 1, wherein the action is to establish a secure connection with the mobile device. 如請求項2之方法,其中該方法包含提供一第一公共金鑰至該行動裝置,其中該識別資訊包括關聯於該行動裝置的一第二公共金鑰,且其中該安全連結係藉由自該識別伺服器接收該第二公共金鑰及該裝置跟該識別伺服器驗證該第一公共金鑰而建立。 The method of claim 2, wherein the method includes providing a first public key to the mobile device, wherein the identification information includes a second public key associated with the mobile device, and wherein the secure link is obtained from The identification server receives the second public key and the device verifies the first public key with the identification server to establish. 如請求項1之方法,其中該動作允許該使用者存取一資產、及供給該使用者一資源的其中一者。 The method of claim 1, wherein the action allows the user to access one of an asset and a resource provided to the user. 如請求項1的方法,其中涉及該行動裝置的傳輸係透過一配對技術而發生。 The method of claim 1, wherein the transmission involving the mobile device occurs through a pairing technique. 一種用於出現識別之系統,其包含:一資料儲存器,用以儲存將使用者關聯於行動裝置的註冊資料的集合,其中註冊資料的集合包括各別的一次性 密碼種子;一註冊模組,用以自一使用者接收一註冊要求以將一行動裝置關聯於該使用者;一一次性密碼種子產生模組,用以針對該行動裝置產生一一次性密碼種子,提供該一次性密碼種子至該行動裝置,及儲存關聯於該使用者、該行動裝置、及該一次性密碼種子的一註冊資料的集合;及一驗證模組,用以響應於藉由該行動裝置廣播的一出現識別符而自一經管理裝置接收一要求,其中該出現識別符包括基於儲存在該行動裝置中的該一次性密碼種子產生的一一次性密碼,及用以在基於儲存在該資料儲存器中的該一次性密碼種子來驗證該一次性密碼後,提供關聯於該使用者的識別資訊至該經管理裝置。 A system for appearance recognition, comprising: a data storage for storing a collection of registration data that associates users with mobile devices, wherein the collection of registration data includes individual one-time Password seed; a registration module to receive a registration request from a user to associate a mobile device with the user; a one-time password seed generation module to generate a one-time for the mobile device Password seed, providing the one-time password seed to the mobile device, and storing a collection of registration data associated with the user, the mobile device, and the one-time password seed; and a verification module, in response to borrowing A presence identifier broadcasted by the mobile device receives a request from a managed device, where the presence identifier includes a one-time password generated based on the one-time password seed stored in the mobile device, and After verifying the one-time password based on the one-time password seed stored in the data storage, the identification information associated with the user is provided to the managed device. 如請求項6之系統,其中該註冊要求包括由該行動裝置產生的一公共金鑰,該公共金鑰係與儲存在該行動裝置上的一私人金鑰配對,及其中該公共金鑰係藉由該一次性密碼種子產生模組而與該註冊資料的集合一起儲存在該資料儲存器中。 The system of claim 6, wherein the registration request includes a public key generated by the mobile device, the public key is paired with a private key stored on the mobile device, and the public key is borrowed The one-time password seed generation module is stored in the data storage together with the set of registration data. 如請求項7之系統,其中提供至該經管理裝置的該識別資訊包括該公共金鑰,以使得在該經管理裝置及該行動裝置間建立安全通訊更容易。 The system of claim 7, wherein the identification information provided to the managed device includes the public key to make it easier to establish a secure communication between the managed device and the mobile device. 如請求項6之系統,其中提供至該經管理裝置的該識別資訊控制該經管理裝置以針對該使用者執行一動作。 The system of claim 6, wherein the identification information provided to the managed device controls the managed device to perform an action against the user. 如請求項6之系統,其中提供至該經管理裝置的該識別資訊授權該使用者使用由該經管理裝置控制的一資源。 The system of claim 6, wherein the identification information provided to the managed device authorizes the user to use a resource controlled by the managed device. 如請求項6之系統,其中該註冊要求係透過一註冊裝置而自該行動裝置接收,及其中該一次性密碼種子係透過該註冊裝置而提供至該行動裝置。 The system of claim 6, wherein the registration request is received from the mobile device through a registered device, and the one-time password seed is provided to the mobile device through the registered device. 一儲存有可由裝置執行之指令之非暫時性電腦可讀媒體,當該等指令被執行時,使得該裝置進行下列動作:將註冊資料傳輸至一識別伺服器,該註冊資料包含與儲存在該裝置中的一第一私人金鑰配對的一第一公共金鑰,且其中該註冊資料係由該識別伺服器使用以將一一次性密碼種子關聯於該裝置的一使用者;自該識別伺服器接收該一次性密碼種子;週期性地廣播一出現識別符,該出現識別符包括基於該一次性密碼種子產生的一一次性密碼,其中該出現識別符係由一經管理裝置使用,以自該識別伺服器獲得識別該裝置之該使用者之資訊及代表該使用者執行一動作。 A non-transitory computer-readable medium that stores instructions executable by the device. When these instructions are executed, the device is caused to perform the following actions: transmit the registration data to an identification server, and the registration data is included and stored in the A first public key paired with a first private key in the device, and wherein the registration data is used by the identification server to associate a one-time password seed with a user of the device; from the identification The server receives the one-time password seed; periodically broadcasts an occurrence identifier, the occurrence identifier includes a one-time password generated based on the one-time password seed, wherein the occurrence identifier is used by a management device, Information identifying the user of the device is obtained from the identification server and an action is performed on behalf of the user. 如請求項12之非暫時性電腦可讀媒體,其中該等指令進一步使得該裝置進行下列動作:自該經管理裝置接收一第二公共金鑰;跟該識別伺服器驗證該第二公共金鑰;及基於該第二公共金鑰及基於該經管理裝置自該識別伺服器接收在該識別資訊中之該第一公共金鑰而與該經管 理裝置建立一安全連結。 The non-transitory computer-readable medium of claim 12, wherein the instructions further cause the device to perform the following actions: receive a second public key from the managed device; verify the second public key with the identification server ; And based on the second public key and based on the managed device receiving the first public key in the identification information from the identification server and with the management The management device establishes a secure link. 如請求項12之非暫時性電腦可讀媒體,其中該註冊資料係透過一註冊裝置傳輸至該識別伺服器,及其中該一次性密碼種子係透過該註冊裝置而自該識別伺服器接收。 The non-transitory computer-readable medium of claim 12, wherein the registration data is transmitted to the identification server through a registration device, and the one-time password seed is received from the identification server through the registration device. 如請求項12之非暫時性電腦可讀媒體,其中該出現識別符基於該一次性密碼種子而週期性地改變,以混淆該裝置的該使用者之身分。 The non-transitory computer-readable medium of claim 12, wherein the presence identifier periodically changes based on the one-time password seed to confuse the identity of the user of the device.
TW106137394A 2016-11-21 2017-10-30 Method and system for presence identification and related computer-readable medium TWI692703B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
PCT/US2016/063013 WO2018093386A1 (en) 2016-11-21 2016-11-21 Presence identification
WOPCT/US16/63013 2016-11-21
??PCT/US16/63013 2016-11-21

Publications (2)

Publication Number Publication Date
TW201820196A TW201820196A (en) 2018-06-01
TWI692703B true TWI692703B (en) 2020-05-01

Family

ID=62146763

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106137394A TWI692703B (en) 2016-11-21 2017-10-30 Method and system for presence identification and related computer-readable medium

Country Status (5)

Country Link
US (1) US11329976B2 (en)
EP (1) EP3497950B1 (en)
CN (1) CN109964499B (en)
TW (1) TWI692703B (en)
WO (1) WO2018093386A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MX2017000742A (en) * 2017-01-17 2018-07-16 Belhareth Sonia System and method for identifying mobile devices via wi-fi without needing a connection.
US10771439B2 (en) * 2017-06-28 2020-09-08 Microsoft Technology Licensing, Llc Shielded networks for virtual machines
US11190511B2 (en) * 2019-01-29 2021-11-30 Salesforce.Com, Inc. Generating authentication information independent of user input
US20220022035A1 (en) * 2020-07-20 2022-01-20 Citrix Systems, Inc. Device management enforcement in secure installations
US11863683B2 (en) * 2021-09-10 2024-01-02 Lenovo (Singapore) Pte. Ltd Method and device for providing communication path

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030163739A1 (en) * 2002-02-28 2003-08-28 Armington John Phillip Robust multi-factor authentication for secure application environments
TW200618576A (en) * 2004-11-29 2006-06-01 Arcadyan Technology Corp Method of auto-configuration and auto-prioritizing for wireless security network
US20060209584A1 (en) * 2004-11-12 2006-09-21 Srinivas Devadas Securely field configurable device
US8736438B1 (en) * 2012-08-15 2014-05-27 Google Inc. Computing device as a vehicle key
TW201613408A (en) * 2014-09-26 2016-04-01 Apple Inc Network bandwidth sharing for mobile devices

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009246417A (en) * 2008-03-28 2009-10-22 Hitachi Ltd Authentication server, program, authentication system, and authentication method
US8914000B2 (en) 2010-10-01 2014-12-16 Wallrust, Inc. Method and system for providing presence information
US20140095286A1 (en) * 2012-10-01 2014-04-03 Google Inc. Private Third Party Validation of Hardware Identification for Offer Enrollment
US9419953B2 (en) * 2012-12-23 2016-08-16 Mcafee, Inc. Trusted container
JP5260788B1 (en) * 2012-12-31 2013-08-14 利仁 曽根 Time-synchronized one-time password authentication method
WO2014164736A1 (en) 2013-03-11 2014-10-09 University Of Florida Research Foundation, Incorporated Materials and methods for improving lung function and for prevention and/or treatment of radiation-induced lung complications
US9537659B2 (en) 2013-08-30 2017-01-03 Verizon Patent And Licensing Inc. Authenticating a user device to access services based on a device ID
US9178889B2 (en) * 2013-09-27 2015-11-03 Paypal, Inc. Systems and methods for pairing a credential to a device identifier
WO2015076846A1 (en) 2013-11-25 2015-05-28 Mcafee, Inc. Secure proxy to protect private data
KR101444305B1 (en) * 2013-12-13 2014-09-26 (주)세이퍼존 Security key using multi-otp, security service apparatus, security system
US9998437B2 (en) 2015-02-04 2018-06-12 Belkin International Inc. Key exchange through a trusted proxy
US9401895B2 (en) * 2014-04-30 2016-07-26 Fujitsu Limited Device configuration for secure communication
US9654581B2 (en) * 2014-05-30 2017-05-16 Apple Inc. Proxied push
KR102349605B1 (en) * 2014-11-17 2022-01-11 삼성전자 주식회사 Method and apparatus for providing services based on identifier of user device
KR101634295B1 (en) 2014-12-16 2016-06-30 주식회사 윈스 System and method for providing authentication service for iot security
EP3065435A4 (en) * 2015-01-05 2017-04-19 EBIID, Products & Solutions, S.L. Method for generating a digital identity for a user of a mobile device, digital user identity, and authentication method using said digital user identity

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030163739A1 (en) * 2002-02-28 2003-08-28 Armington John Phillip Robust multi-factor authentication for secure application environments
US20060209584A1 (en) * 2004-11-12 2006-09-21 Srinivas Devadas Securely field configurable device
TW200618576A (en) * 2004-11-29 2006-06-01 Arcadyan Technology Corp Method of auto-configuration and auto-prioritizing for wireless security network
US8736438B1 (en) * 2012-08-15 2014-05-27 Google Inc. Computing device as a vehicle key
TW201613408A (en) * 2014-09-26 2016-04-01 Apple Inc Network bandwidth sharing for mobile devices

Also Published As

Publication number Publication date
CN109964499B (en) 2023-04-04
US11329976B2 (en) 2022-05-10
TW201820196A (en) 2018-06-01
US20190052627A1 (en) 2019-02-14
WO2018093386A1 (en) 2018-05-24
EP3497950A4 (en) 2020-03-18
CN109964499A (en) 2019-07-02
EP3497950A1 (en) 2019-06-19
EP3497950B1 (en) 2024-03-20

Similar Documents

Publication Publication Date Title
TWI692703B (en) Method and system for presence identification and related computer-readable medium
US10361857B2 (en) Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon
US10075849B2 (en) Secure distribution of electronic content
US10009327B2 (en) Technologies for secure storage and use of biometric authentication information
US10362613B2 (en) Pairing management method, recording medium, and terminal apparatus
KR102223609B1 (en) Content sharing method and apparatus
EP3611871B1 (en) Technologies for synchronizing and restoring reference templates
US10055567B2 (en) Proximity unlock and lock operations for electronic devices
US20180019878A1 (en) Authenticating a user and registering a wearable device
US20160342784A1 (en) Mobile device authentication
WO2016086584A1 (en) Method and authentication device for unlocking administrative rights
US8990572B2 (en) Methods and systems for conducting smart card transactions
WO2017185577A1 (en) Esim card data sharing method, and related device and system
JP2018504688A (en) Communication system including head wearable device
US10772141B2 (en) System and method for peer-to-peer wireless communication
WO2017063517A1 (en) Near field communication establishing method and device
US11824850B2 (en) Systems and methods for securing login access
WO2019101156A1 (en) Device control method, and related device for same
US20170366345A1 (en) Fingerprint Revocation
US9876792B2 (en) Apparatus and method for host abstracted networked authorization
US9622075B2 (en) System and method for adaptive multifactor authentication
US11709924B2 (en) Secure authentication
US11316680B2 (en) Protected credentials for roaming biometric login profiles
KR20190020380A (en) System for providing electronic payment by authenticating patient and using card information, method thereof and non-transitory computer readable medium having computer program recorded thereon
WO2023142748A1 (en) Device unlocking method and apparatus, electronic device and computer-readable storage medium